Skip to main content

Beyond Traces

  • Chapter
  • 2059 Accesses

Part of the book series: Texts in Computer Science ((TCS))

Abstract

In previous chapters we have already discovered that traces give an incomplete picture of how processes behave, for example by failing to distinguish deterministic from nondeterministic behaviour and failing to capture deadlock properly. In this chapter we introduce the ideas of failures and divergences, which allow us to develop models that do capture these phenomena accurately. We see how these models allow to formulate and verify richer specifications on FDR. The phenomenon of divergence is described and we show one way to ensure it does not happen. We introduce lazy abstraction as a variant on hiding and show how it can be applied to capturing fault tolerance and computer security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This is termed the stable failures model \(\mathcal {F}\).

  2. 2.

    While the theory that allows us to build full CSP models without divergence strictness is complex, this does not mean that such models are hard to apply. In fact the difficulties only really appear for infinite-state processes rather than the finite-state ones that FDR can handle, and the model with failures and non-strict divergences could and should be implemented in FDR. The value given by this model to the token ring routing system with internal actions hidden is very natural: see Sect. 12.4.

  3. 3.

    Though one needs to be careful with unboundedly nondeterministic ones.

  4. 4.

    For details of the more advanced models now additionally supported, see Chaps. 11 and 12.

  5. 5.

    There are a number of definitions of ‘security’ in the literature which would define such P′ to be secure for all P, even though if with \(P={\mathit {LEAK}}\/=hi?x\mathrel {\rightarrow }\mathit{lo}!x\mathrel {\rightarrow }\mathit{LEAK}\), for example, you can guarantee that if Hugh communicates anything with P′, then Lois gets to hear it.

References

  1. Roscoe, A.W., Woodcock, J.C.P., Wulf, L.: Non-interference through determinism. J. Comput. Secur. 4(1), 27–54 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. W. Roscoe .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London Limited

About this chapter

Cite this chapter

Roscoe, A.W. (2010). Beyond Traces. In: Understanding Concurrent Systems. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84882-258-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-258-0_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-257-3

  • Online ISBN: 978-1-84882-258-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics